The best structure for most organizations is to have a security team responsible for carrying out vulnerability...
assessments. This team is usually led by a security administrator and is overseen by a CISO or CSO. Ideally, the IT operations and network group maintains the systems and the network, and a separate security team -- even if it's just one person -- assigns permission rights, configures security products, reviews logs for security incidents and carries out vulnerability assessments. These groups should be separate because each has a different focus. The network group needs to focus on time and availability. If a system goes down or network connectivity is lost, the network group will be on the hot seat. The security team has the focus of securing the environment.
If security and network responsibilities fall within one group, let's say the IT group, and it is not segregated, usually there isn't enough focus on security. To avoid any conflicts of interest, it is important that the security administrator does not report to the network administrator. The security administrator should report to the CSO and the network admin should report to the CIO. While many organizations aren't large enough or security mature enough to support this structure, it is the best one to work towards.
Dig Deeper on Security Awareness Training and Internal Threats-Information
Related Q&A from Shon Harris
When it comes to firewalls, the networking group often handles the installation, while the information security department writes the rules. Should ... Continue Reading
In today's security world, it's hard to keep track of each and every management standard and auditing procedure. In this SearchSecurity.com Q&A, ... Continue Reading
Before you begin putting the pieces of your security program together, you may want to have a look at ISO 27001. In this expert Q&A, Shon Harris ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.